Scaling-Up and Automating Web Application Security
This blog post summarizes a security talk given by CEO, Ferruh Mavituna, about scaling-up and automating web application security. Ferruh discusses the stages of vulnerability detection, website and vulnerability categories, the benefits and limits of automation, pre and post-scan challenges to automation, and the elimination of false positives.
Your Information will be kept private.
Stay up to date on web security trends
Your Information will be kept private.

A few years ago, Netsparker CEO Ferruh Mavituna gave a talk at Infosecurity Europe, a major security conference. He spoke about why organizations need to scale their web security operation and how automation can play a key role. Securing web apps manually, requires outsourcing, money, time, and a large team. Automation is the solution.
There are three stages to the vulnerability detection process:
- Discover & Prioritize
- Identify
- Automate
- Configuration issues (at the server rather than the app layer)
- Known vulnerabilities and out-of-date dependencies
- Unknown vulnerabilities (possibly the most serious, since they have been just developed and so have no signature)
- Lack of security best practice and proactive measures (Netsparker now nas a new Best Practice Severity Level)
"Automate What Can be Automated."
Given the limits of automation, it’s only natural to expect challenges in the vulnerability detection process. Before you start a scan or test the security of an app, there are challenges with authenticated scans, URL Rewrites, Custom 404 pages and Form Values. Although Netsparker has solved these problems, it is with the post-scan challenges that Netsparker comes into its own.- So, thanks to your automated web application security scanner, thousands of issues have been identified, now what?
- How many of the identified vulnerabilities are real?
- What’s the real risk?
- How long would it take to review all vulnerabilities to see which are false positives?
- And what kind of technical expertise do you need to accomplish this?